statistic math money forex

12/16/2007
12/18/2007
Over 50 years of accurate, speedy, and affordable metal analysis. Dedicated Analytical Solutions for chemical analysis from Foss
12/16/2007
Mini-Gold spot trading, 24 hour 200:1 leverage, No Commissions. Two "Backdoor" Plays Ready to Soar. Get Your Free Investment Report.
12/16/2007
Ironman punya keunikan dalam warna dan tampilan. Beda dengan Robocop jauh lebih canggih dan lebih berfantasy... Saya mau koleksi…
12/14/2007
Gambar 1/2 manusia 1/2 kucing ditambah tatoo diseluruh badan menjadikan dia benar-benar 1/2 gila. Gigi manusia ini sudah berbentuk…
12/14/2007
Coba tebak berapa ukuran babi raksasa ini? berapa kilogram beratnya? Ukuran kepalanya saja mungkin sudah seberat 5 manusia. Babi…
12/18/2007
Serangan Jantung dan kebiasaan Minum Air Panas / hangat.... Artikel ini berguna untuk semua. Bukan saja anjuran meminum air…
12/16/2007
Foto wanita tercantik tercantik sejagat planet dan woowww... coba perhatikan!!.. Tapi kenyataannya dia memang menang dalam kompetisi.. Woow... So cute…
12/16/2007
Artis sinetron punya keunikan dalam warna dan tampilan. Beda dengan penyanyi jauh lebih canggih dan lebih berfantasy... Saya mau koleksi…
12/16/2007
Gambar atau foto ini adalah gambar helm Ironman dalam versi 3D. Film akan diputar pada pertengahan tahun depan (2008).…
12/14/2007
Gambar 1/2 manusia 1/2 kucing ditambah tatoo diseluruh badan menjadikan dia benar-benar 1/2 gila. Gigi manusia ini sudah berbentuk…
12/14/2007
Coba tebak berapa ukuran babi raksasa ini? berapa kilogram beratnya? Ukuran kepalanya saja mungkin sudah seberat 5 manusia. Babi…
12/18/2007
Serangan panas dan sembriwing.... Artikel ini berguna untuk semua. Bukan saja anjuran meminum air…
12/16/2007
Gambar cewe tercantik sejagat Asia Raya menurut saya sih.. Tapi kenyataannya dia memang menang dalam kompetisi.. Woow... So cute…
12/16/2007
Ironman punya keunikan dalam warna dan tampilan. Beda dengan Robocop jauh lebih canggih dan lebih berfantasy... Saya mau koleksi…
12/16/2007
Gambar atau foto ini adalah gambar helm Ironman dalam versi 3D. Film akan diputar pada pertengahan tahun depan (2008).…
12/14/2007
Gambar 1/2 manusia 1/2 kucing ditambah tatoo diseluruh badan menjadikan dia benar-benar 1/2 gila. Gigi manusia ini sudah berbentuk…
12/14/2007
Coba tebak berapa ukuran babi raksasa ini? berapa kilogram beratnya? Ukuran kepalanya saja mungkin sudah seberat 5 manusia. Babi…
12/18/2007
Serangan Jantung dan kebiasaan Minum Air Panas / hangat.... Artikel ini berguna untuk semua. Bukan saja anjuran meminum air…
12/16/2007
Gambar cewe tercantik sejagat Asia Raya menurut saya sih.. Hot..hot.. wow..wow... gila..busett.... Woow... So cute…
12/16/2007
Fantastic 4 punya keunikan dalam warna dan tampilan. Beda dengan girl powernya fs jauh lebih canggih dan lebih berfantasy... Saya mau koleksi…
12/16/2007
Gambar atau foto ini adalah gambar helm Ironman dalam versi 3D. Film akan diputar pada pertengahan tahun depan (2008).…
12/14/2007
Gambar 1/2 manusia 1/2 kucing ditambah tatoo diseluruh badan menjadikan dia benar-benar 1/2 gila. Gigi manusia ini sudah berbentuk…
12/14/2007
Coba tebak berapa ukuran babi raksasa ini? berapa kilogram beratnya? Ukuran kepalanya saja mungkin sudah seberat 5 manusia. Babi…
Jumat, 18 Januari 2008
LAWMA ON DUTY
They are equally at the mercy of street urchins popularly called ‘area boys’ and armed robbers, who sometimes mistake them for security agents. Yet, they are undaunted by the many risks.
An Ordinary National Diploma certificate holder, Popoola carries out his job with a bright face. Every evening at around 8.00pm, he and his other colleagues gather at a designated point to be briefed by their manager on how the night’s operation would be conducted.
Minggu, 06 Januari 2008
Which agencies are best? Join AARG to find out!
==============================
(Return to: Agency_Research@yahoo.com)
1. In which city and state do you live?
2. In what INDUSTRIES do you AND your spouse/partner work?
3. Where have you adopted from previously? What is the name of the
agencies or attorneys you used?
4. Currently, from which countries are you thinking about adopting? Any
agencies in mind?
5. Why do you want to join this Group?
6. READ THIS CAREFULLY. You must respond YES or NO to this question.
Respond YES if you or your family members are NOT involved in the Adoption
Industry; respond NO if you or your family members ARE involved, and
explain HOW you are involved:
Do you CERTIFY that neither you, your spouse (if applicable), your adult
children (if applicable), your employer, nor any other member or employer of
your immediate family is engaged in any aspect of the Adoption Industry,
either voluntarily or on a paid basis, with a domestic and/or international
adoption agency, adoption facilitator or facilitation service, adoption
referral service, adoption advertiser, foster/adopt program, adoption home
study provider, adoption attorney, care or counseling of birth parents, or
any other group or organization, for profit or not, involved in the
placement of children for money or which advocates on behalf of adoption
agencies (i.e., FOA or JCICS)?
Your Response:
Never miss a thing. Make Yahoo your homepage.
Jumat, 04 Januari 2008
Please reactivate your Yahoo! Groups email address
You belong to one or more email groups provided by Yahoo! Groups
(groups.yahoo.com).
Recently, messages sent to you from Yahoo! Groups have been
returned to us as undeliverable. As a result, we have temporarily
turned off message delivery to this email address.
If you are reading this message, the delivery problem appears to
be fixed. To start receiving your groups messages by email again and
turn your account back on, please visit:
http://groups.yahoo.com/unbounce?adj=333147644,76956&p=1199259387
(You can also copy and paste this link into your browser, and hit the
'Return' key.)
Once you reactivate your Yahoo! Groups account by clicking the
link above, you will receive messages from your group(s) again.
Tip: You can read messages you might have missed while delivery was
turned off by visiting your groups here:
http://groups.yahoo.com/mygroups
Thank you for using Yahoo! Groups!
Yahoo! Groups Customer Care
Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
Please reactivate your Yahoo! Groups email address
You belong to one or more email groups provided by Yahoo! Groups
(groups.yahoo.com).
Recently, messages sent to you from Yahoo! Groups have been
returned to us as undeliverable. As a result, we have temporarily
turned off message delivery to this email address.
If you are reading this message, the delivery problem appears to
be fixed. To start receiving your groups messages by email again and
turn your account back on, please visit:
http://groups.yahoo.com/unbounce?adj=333147644,76956&p=1199259387
(You can also copy and paste this link into your browser, and hit the
'Return' key.)
Once you reactivate your Yahoo! Groups account by clicking the
link above, you will receive messages from your group(s) again.
Tip: You can read messages you might have missed while delivery was
turned off by visiting your groups here:
http://groups.yahoo.com/mygroups
Thank you for using Yahoo! Groups!
Yahoo! Groups Customer Care
Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
Kamis, 03 Januari 2008
File - Unsubscribe Letter
There is only 2 step's to this.
1) Your reading this message. You've done your part. You've Unsubscribed.
2) BE PATIENT!!!!! Yahoo Groups is slow at times but will process your request to be unsubscribed. It will take anywhere from up to 48 hrs to 3 day's before you will stop receiving group email from us. Again, please be PATIENT. It take's time, but eventually they'll stop. PLEASE DO NOT EMAIL THE GROUP TO BE UNSUBSCRIBED. It only starts flaming.
Thank you,
List Moderator's
Rabu, 02 Januari 2008
File - Phishing.txt
Please Read this important post first from one of our members...
http://finance.groups.yahoo.com/group/investmentprograms/message/14310
Thx TaS
I thought the following may be of interest. With so many losing their
gold due to hackers, this clever phishing is a very likly cause it is
incredable how they can trick you even when you are on a trusted site.
See or read below:
http://www.theregister.co.uk/2004/11/02/phishing_tabbed_browsers/
Phishing for dummies: hook, line and sinker
By Scott Granneman, SecurityFocus
Published Tuesday 2nd November 2004 14:55 GMT
Recent "phishing" episodes, and two new browser vulnerabilities, show
how the bad guys are tricking people into exposing their passwords
and bank accounts. Couldn't happen to tech-savvy users, right? Unless
you consider how entire nations have been fooled.
The art of faking out opponents in a clever, elegant, beautiful way
is one that I find fascinating, and I cherish examples of that art.
When looking through history for stories illustrating the deliberate
use of distractions to obfuscate an intended purpose, I often return
to World War II, which offers many such tales.
The story of the allies' cracking of the German Enigma machine is one
that everyone in security should know about. Used by the Germans, the
Enigma machine was cracked by the allies using a variety of
techniques. Math played its part, but so did subterfuge. Robert
Morris, former chief scientist at the NSA (and father of the Morris
Worm author), explained during a talk at Blackhat Briefings that the
Americans noticed that German weather ships trawling in the North
Atlantic used Enigma machines to send in weather reports every day.
If the Allies could acquire those machines and their keys, it would
be a major help in decrypting Enigma. Consquently, the Allies sank a
couple of the ships in what seemed like a normal wartime action, but
in reality salvage teams immediately went to work and recovered the
Enigma machines and the required keys. The Germans never suspected
what the real target of the attacks was, and the Allies had another
tool to use in their war.
Several incidents, famous only after the war, occured during the
preparations for the liberation of Europe from the fascists. The
Allies wanted to confuse the Nazis so that the actual locations of
the landings - the beaches of Normandy for D-day in 1944 and Sicily
in the Mediterranean in 1943 - would be secret as long as possible,
so they developed several deceptions that were purposely designed to
be "accidentally" picked up by Nazi operators, including:
Operation Fortitude A fake First Army Group, supposedly commanded by
General George S. Patton, sent fake radio messages confirming that
the Pas de Calais was going to be the epicenter of D-day. In
addition, airfields were created that contained row upon row of
papier-mache planes, designed to fool air surveillance.
Operation Skye Radio traffic out of Scotland intentionally deceived
the Germans into believing that the D-day attack was going to come
out of northern Europe, in either Norway or Denmark.
Operation Mincement (This one is my favorite) This brilliant plan
involved dropping a dead man, wearing a life jacket and supposedly
named "Major William Martin", into the ocean off the coast of Spain
in April 1943. Chained to his wrist was a briefcase containing forged
war plans about the upcoming invasion of Sardinia. Hitler fell for it
completely, diverting Axis defenses to Sardinia and allowing the
Allies much easier access to the island of Sicily, the real target.
In the cases above, the good guys used subterfuge, trickery, even
treachery to fool their enemies into beliving that what they were
seeing and hearing was true, when it fact it was anything but. We're
seeing the same sort of chicanery today on the web, except now its
ordinary users who are being duped by the bad guys, and the good guys
have a heck of a time making the situation any better. I'm referring
to the epidemic of phishing that is currently one of the biggest
problems on the net.
Reaching the point of epidemic
I don't know about you, but I get at least one email every few days
that is supposedly from CitiBank (currently used in 54 per cent of
phishing messages), or PayPal, or eBay, or Amazon, or SunTrust Bank
(who the heck are they?), or or or or or ... the list goes on and on.
The emails always mention that my account needs to be updated, or my
credit card has been charged for some enormous purchase that I never
made and I need to correct this, or that I need to verify some
information the website has on me. Whatever. The goal is always to
get me to believe that a company I use for financial transactions -
and who therefore is trusted by me - needs information, so that I
submit personal data that can be used by criminals to further their
own ends. These messages can look very, very real, as the image
below, taken by blogging pioneer Dave Winer shows. Yes, he uses
Outlook Express for some reason, and received this in his email
(click for a bigger pic):
Keep in mind that phishing is not confined to email, but is also web-
based as well. In fact, those emails wouldn't work without a
corresponding website, designed also to look as realistic as
possible, containing forms for suckers to fill in. But there are also
various tricks that can be played on unsuspecting web users that can
get them in trouble.
How big is that trouble? Enormous, and growing. According to a
Gartner Group study from May of this year, at least 1.8m consumers
have been tricked by phishing attacks into revealing sensitive
information - and the majority of that 1.8m occured within the year
prior to that report. In just the last six months, phishing emails
have increased by 4000 per cent. On average, a consumer loses $1200
when his bank account is taken over, and the vast majority of such
takeovers are from phishing. Think about those numbers for a second.
1.8m people affected. 4000 per cent increase. $1200 average loss per
person.
This is escalating into such a problem for banks that many of them
are now refusing to protect their customers and, as The Boston Herald
reports, are now choosing instead to "litigate, fight and force
consumers to settle for lower amounts". If you were fooled through
phishing, your bank very well may refuse to reimburse you. Most
consumers know that if they get screwed using a credit card, they're
only liable for $50. Not so with bank accounts, evidently. Some of
you might think, as I did, that FDIC protections safeguard those of
us who live in the US, at least up to $100,000 (which is far, far
more coverage that this columnist needs!) Nope. Those only apply if
the bank declares bankruptcy, not if an Eastern European cracker
employed by the mob tricks me into revealing my PayPal password and
then cleans out my bank account.
Browser Problems
So phishing is a large, serious, and growing, problem. That's bad.
And then within the last few weeks we received even worse news: many
of our favorite (and some not-so-favorite) web browsers were
vulnerable to phishing using a particularly clever attack vector: the
tabs that many of us have come to know, love, and depend upon.
Secunia issued a security report detailing how most major web
browsers with the tabbed browsing feature were vulnerable to two
different vulnerabilities.
First, the browsers. Recognize any you use?
Mozilla 1.7.3
Mozilla Firefox 0.10.1
Camino 0.8
Opera 7.54
Konqueror 3.2.2-6
Netscape 7.2
Avant Browser 9.02 build 101 and 10.0 build 029
Maxthon (MyIE2) 1.1.039
That list contains several that I use on a daily basis: Firefox,
Opera, Konqueror, even Mozilla. In many cases, these are the very
latest versions of these browsers (not counting nightly builds, of
course). A cross-section of browser rendering engines - Gecko, KHTML,
Trident, Presto, and more - is represented. The major operating
systems, Linux, Mac OS X, and Windows, are represented as well.
Microsoft's Internet Explorer - at least an un-enhanced IE, since
Avant and Maxthon are just feature-laden shells wrapped around IE's
Trident rendering engine - is unaffected, but only because IE by
itself is so lacking in modern features that it doesn't even support
tabs (hey, maybe that's why Microsoft hasn't ever included support
for tabs in IE - 'cause they're concerned about security!).
Now, the vulnerabilities. One of them is pretty clever, and one of
them, I think, is a bit overstated, but I'll explain that in a second.
You have a couple of different websites open in a couple of tabs. You
open another tab and head over to a trusted website, like PayPal's.
You're on the PayPal site, when suddenly a dialog box opens,
apparently from PayPal, and asks you to enter your password and your
credit card info, "for verification purposes". You do so and keep
using the PayPal site, never realizing that it was not the PayPal tab
that spawned that dialog box, but a web site on a different, inactive
tab. To see what I'm talking about, open the demo site at Secunia
with an affected browser and follow the instructions. Very clever.
There are two problems here. First, the browser doesn't easily keep
the user informed as to which tab is responsible for the dialog box.
That's an easy fix. Second, the browser shouldn't allow inactive tabs
to spawn dialog boxes in the first place. Another easy fix. But
still - not good. Clearly, none of the organizations creating these
browsers ever envisioned such an attack. Of course, this attack will
only work if you're already on a shady web site to begin with, and if
that site knows you've gone to a site that it knows you trust, like
PayPal. As Secunia itself points out, for this sneaky stunt to work
it would "normally require that a user is tricked into opening a link
from a malicious web site to a trusted web site in a new tab".
Clearly, the likelihood of that string of events is pretty small. But
it's still clever, and it would undoubtedly get a lot of folks in
trouble if they somehow had both the "bad" and the "good" sites open
at the same time in separate tabs.
The second vulnerability strikes me as even less likely, but perhaps
I'm wrong. Let's say you have a couple of different web sites open in
a couple of tabs. You open another tab and head over to a trusted
website, like PayPal's. You type in your username and password, but
nothing shows up. You type it again. Still nothing. Assuming that
PayPal's site is temporarily borked, you close the tab and continue
on your merry way. Little do you know that everything you typed
actually went into a form on a site found on one of your other tabs.
If you want to see this in action, Secunia has a demo site up for
this one as well.
Now, this one seems quite unlikely to me, even more so that the
first. Secunia justifies the seriousness of the hole by claiming that
it "is escalated a bit by the fact that most people do not look at
the monitor while typing data into a form field", which doesn't jibe
with what I do or what I see. In my experience, most folks - not all,
but most - look at form fields while they're typing, so I think that
they would immediately notice when text isn't appearing. Further, it
doesn't matter if the text you're trying to type is actually entered
into a form field in another tab - you'd have to actually go back to
that tab, not notice that your PayPal password was sitting there in a
field, and then go ahead and press Submit and send that data to the
bad guys. I find this scenario even less likely than the one in the
first vulnerability, but maybe I'm nuts.
So here we have problems in some very popular tabbed browsers.
Secunia's advice is logical: either disable JavaScript (which will
cause problems using a vast number of web sites, so it's not likely),
or avoid opening a trusted web site in a tab when other tabs already
contain untrusted websites. OK. Not bad advice. So if you want to use
PayPal or eBay or your bank, open up a new Firefox window first. No
problem. A fix, of course, would be better.
In the usual open source tradition of fixing flaws quickly, Konqueror
released a version of the browser that was patched against the
vulnerabilities, and Firefox promised that it would be secured by the
time 1.0 is released, sometime in the new few weeks. On the other
hand, Netscape, now owned by AOL, and Avant never bothered to respond
to Secunia when it contacted them. Guess I know which browsers to
avoid.
I'm not trying to discredit Secunia or these vulnerabilities. They
are definitely problems that need to be fixed. It's just that there's
a big difference between the almost torturous series of steps
required to exploit users with these vulnerabilities as compared to
the recent IE exploit that involved simply visiting your bank's
website. However, there are other phishing vulnerabilities out there,
involving Google, for instance, that are far easier to fall for.
Undoubtedly there are many, many others, involving weaknesses in the
web sites and in the web browsers we all use every day, that will be
discovered. We need to be aware of these openings because they remind
us that phishing is not just a matter of receiving an email that's a
doppelganger for a real one from a company we do business with, but
also that phishing is increasingly going to use the vector of the
browser itself as an opening for exploitation. And that, as security
pros undoubtedly know in their bones, is going to be an even bigger
problem than duplicitous emails.
Copyright © 2004,
Scott Granneman is a senior consultant for Bryan Consulting Inc. in
St. Louis. He specializes in Internet Services and developing Web
applications for corporate, educational, and institutional clients.
All the best,
Tony P
http://myhyipworld.com
http://www.myhyipworld.com/AAI.htm
http://finance.groups.yahoo.com/group/investmentprograms
http://www.easyresponders.com/subscribe.aspx?u=1231/1490
http://finance.groups.yahoo.com/group/AAInvestors
http://finance.groups.yahoo.com/group/HYIPGames
***
File - Please READ before you post...
This is an automated message sent every 2 weeks...
PLEASE BE ADVISED:
Do not disclose anything from inside our group to any other outside forum or anywhere else "on the net" unless you have specifically asked for permission to do so.
PLEASE BE ADVISED:
Do not disclose anything from inside our group to any other outside forum or anywhere else "on the net" unless you have specifically asked for permission to do so.
This includes the Bad IP list which has been compromised in the past and has now been moved to an autoresponder server here:
http://www.easyresponders.com/subscribe.aspx?u=1231/1314
Simply sign up and read the following automatic email in your inbox to receive the Bad IP List updates.
By all means get your friends and family into "IP" so that they can benefit from the information within the "IP" group.
I will not disclose the copyright issue with you, as you should know what it is.
The list was created for the members in "IP". What is said and disclosed in "IP" should stay in "IP"
PLEASE ALSO RE-READ OUR "TERMS FOR JOINING THIS GROUP. ALL ADVERTISED REFERRAL LINKS FOR PROGRAMS WILL RESULT IN YOU BEING MODERATED AND REPEAT OFFENDERS WILL BE BANNED FROM THIS GROUP". I hope you understand...
***
BY JOINING OUR GROUP YOU ARE BOUND BY THE "TERMS OF JOINING" AS ADVERTISED BELOW.
***
This group is a RESTRICTED members only group.
What is said in "IP" STAYS in here...FULL STOP...
***
TERMS OF JOINING...
NO YAHOO ID = CANNOT JOIN
Posts regarding anything other than a relation to HYIP / AUTOSURFING / FOREX or of a "Related Nature" will be rejected.
REFERRAL LINKS = DELETED POSTS and Moderated with a possible BAN
SIGNATURES ARE ALLOWED - Providing they do not contain Referral Links
DOUBLERS AND QUICK MONEY MAKERS = DELETED POSTS and Moderated with a possible BAN
SPAM = AUTOMATIC BAN
HARD BOUNCING EMAILS = YOU WILL BE REMOVED FROM THE GROUP
SOFT BOUNCING EMAILS will be REMOVED after 1 months
STRONG/ABBREVIATED/ABUSIVE LANGUAGE or ANYTHING I consider as DEROGATORY in ANY Posts or towards MEMBERS = AUTOMATIC BAN ...Please keep it civil.
IF you have been banned the ONLY way to rejoin if you wish is to use another Yahoo ID and email address.
I WILL NOT RESTORE YOUR OLD ID or email address.
*****************
So what do we do?
*****************
We are a group of Investors that help each other find the Paying programs and SCAMS in AUTOSURFERS FOREX & HYIP.
If you have been scammed in the past, then this is definately the place to join.
ALL of our members CAN and ARE advised to post their problems.
This groups POSTINGS are UNMODERATED.
Only new members are moderated for the first couple of posts.
WHEN YOU JOIN you will receive a number of AUTOMATED EMAILS, they are for your benefit so please read them
***
Please also post your NON Paying programs to this group.
Talk or Enquire about any HYIP / AUTOSURFER / FOREX or RELATED TOPIC, but please refrain from using referral links.
This group is for finding SCAMS and PAYING programs only, NOT for free advertising...
All the best,
Tony P
http://finance.groups.yahoo.com/group/investmentprograms
***
If you have any questions please do not hesitate to ask them...
If you do not wish to belong to our group anymore, you may easily unsubscribe by sending an email to...
investmentprograms-unsubscribe@yahoogroups.com
And please remember....NO referral links....
***
If you are posting about a particular program, then please try to use the URL as the subject heading. This helps us all to find out what you are enquiring about and also aids when searching the archive folder...
***
REF LINKS...
Ref links are designated like this.............
http://myhyipworld.com is NOT a ref link it is a stepping stone to another
webpage. I do not force people to click one link and then automatically get
a referral for it. People, if they want to go to my website and if they
like anything they see then they will click on it. I do not force this
link on anybody .... If they click a link after viewing the contents ...
THEN IT BECOMES A REF LINK.
Direct links like http://www.gold.com/refid=you is a ref link. People
will go to that site and automatically the cookies take over your computer
and remember the IP and machine. Should that person not decide to join then
they will go somewhere else. If they decide to join at a later date then
the cookie is stored and the ref link becomes active again.
If people go to my site and do not click anything but come back at a later
date there is no cookie stored and if they clicked
http://www.joinme.com/ref=tony it would all depend if they were invited
from someone else and that person would get the ref link instead of me.
People can remove these links as they see fit... but I do not have a direct
link to a website that will earn a fee from it.
I hope this makes sense?
I absolutely hate banning members but many people have been testing my
patience recently...
If you are unsure then please re-read the rules on the home page...
http://finance.groups.yahoo.com/group/investmentprograms
My sincere apologies go out to ALL those who uphold the groups rules...
You are the greatest!!
All the best,
Tony P
http://myhyipworld.com
http://www.myhyipworld.com/AAI.htm
http://finance.groups.yahoo.com/group/investmentprograms
http://www.easyresponders.com/subscribe.aspx?u=1231/1490
http://finance.groups.yahoo.com/group/HYIPGames
***
File - Neotrace
If you have no idea what an IP is or want to know how to trace IPs,
there is a program called NeoTrace.
Goto the Files menu and download it.
Simply install it and type in (or copy n paste) the website URL and
press go.
It really does do all the hard work for you!
All the best,
Tony P
http://myhyipworld.com
http://www.myhyipworld.com/AAI.htm - NEW LINK
http://finance.groups.yahoo.com/group/investmentprograms
http://finance.groups.yahoo.com/group/HYIP_Newsletter
http://finance.groups.yahoo.com/group/AAInvestors
***
-------------------------------
Technical Jargon
-------------------------------
"NeoTrace is a diagnostic and investigative tool. It traces the
network path across the Internet from the host system to a target
system anywhere on the Internet.
Automatic retrieval of data includes registration details for the
owner of each computer on the route (address, phone, email address)
and the network each node IP is registered to.
Easy to read views of the data include a world map showing the
locations of nodes along the route, a graph showing the relative
response time of each node along the path, and a configurable list of
node data."
--------------------------------
File - HijackThis
This is an automated email sent every 2 weeks.....
Tony P
http://finance.groups.yahoo.com/group/investmentprograms
***
Be careful out there.....Does Explorer keep closing? Does your E-gold Account keep emptying????
There is an e-gold hacker trojan floating around the net....
HijackThis Detector will tell you if something is not right with your computer and then you can safely remove it...
"HijackThis : A general homepage hijackers detector and remover. Initially based on the article Hijacked!, but expanded with almost a dozen other checks against hijacker tricks. It is continually updated to detect and remove new hijacks. It does not target specific programs/URLs, just the methods used by hijackers to force you onto their sites. As a result, false positives are imminent and unless you are sure what you're doing, you should always consult with knowledgable folks (e.g. the forums) before deleting anything.
A rudimentary HijackThis log tutorial by the author is available here."
http://www.merijn.org/htlogtutorial.html
Download HijackThis from here:
http://www.merijn.org/files/hijackthis.zip
Unzip it and run it...make sure you save a logfile.
Copy and paste the contents of the logfile info into here:
http://www.hijackthis.de/index.php?langselect=english
It will inform you of what to remove or look at on your computer
Take care and all the best,
Tony P
http://myhyipworld.com
http://www.myhyipworld.com/AAI.htm
http://finance.groups.yahoo.com/group/investmentprograms
http://www.easyresponders.com/subscribe.aspx?u=1231/1490
http://finance.groups.yahoo.com/group/AAInvestors
http://finance.groups.yahoo.com/group/HYIPGames
***
File - Readme 2
As you are a member of Investmentprograms, I am inviting you now to join my other groups.
http://www.easyresponders.com/subscribe.aspx?u=1231/1490
http://finance.groups.yahoo.com/group/HYIPGames
You may of course unsubscribe at ANY time...
All the best,
Tony P
http://myhyipworld.com
http://www.myhyipworld.com/AAI.htm
http://finance.groups.yahoo.com/group/investmentprograms
http://www.easyresponders.com/subscribe.aspx?u=1231/1490
http://finance.groups.yahoo.com/group/AAInvestors
http://finance.groups.yahoo.com/group/HYIPGames
***
File - Readme 4
Compounding
When you have been returned your initial spend money from an HYIP it is a good idea to compound the profits. Put as much as you can afford (without getting a loan out !) into a HYIP that lets you Compound your investment.
Reason? Better returns in a short space of time.
I have added a file on the group website for you that shows you what compounding can do for you. You just need to download it.
Also, you can download the free HYIP Investment Simulator. Just find it in the "Files" Section.
All the best for now,
All the best,
Tony P
http://myhyipworld.com
http://www.myhyipworld.com/AAI.htm
http://finance.groups.yahoo.com/group/investmentprograms
http://www.easyresponders.com/subscribe.aspx?u=1231/1490
http://finance.groups.yahoo.com/group/AAInvestors
http://finance.groups.yahoo.com/group/HYIPGames
***
File - Question about Checking IPs
The IP checking is just the starting point before I start any DD on
a particular investment.
The IP List is a "Tool" to help you decide whether or not to follow
up on the company with some Due Diligence.
I myself use the list everytime I find a new program to invest into.
If I find a program that has all 4 numbers matching, then I place
them on the back burner.
If I find a program that has the first 3 numbers matching, they also
get placed on the back burner.
If I find a program with only the first 2 numbers matching ... then
I go into overdrive and "scrutinise" every piece of information from
all of my searches on them and I cross reference everything I find
with "Other Sources / People" that i have and know.
Once I have completed that one, I will move back and start checking
up on the 3 and 4 matching numbers...
Very time consuming ...YES
Fruitful labour ... YES
...Because If I have devoted my time to "check them out" and it pays
off, then the funds will roll in.
This is how, I personally, have operated in the last 10 years or so.
I do not list many programs on my website, purely because the rest
are not worthy (in my own eyes) to invest into / promote to people.
As I have mentioned in the past regarding the IPs and the IP List,
Yes some GOOD programs get caught up on the same servers as that of
failed programs.
This is where you start doing your DD...Email the admin, get a feel
for how they operate, what they do and even try to find out what
they had for lunch last week! :) lol
The files menu also contains other places to help you search out the
program that you are enquiring about, so please give it a visit.
When starting DD the domainwhitepages.com is an excellent tool.
Look at all the info about the person, the address listed, the phone
number, the creation date, the expiry date, the server host, the
email address etc etc etc...
Look carefully and you can spot a bad / fake one from the very
start...This obviously takes a bit of time and practice. But the
more your rely on doing DD for programs, the easier it will become
and the more successful you will become in monetary terms.
Take care and all the best,
Tony P
http://myhyipworld.com
http://www.myhyipworld.com/AAI.htm
http://finance.groups.yahoo.com/group/investmentprograms
http://finance.groups.yahoo.com/group/HYIP_Newsletter
http://finance.groups.yahoo.com/group/AAInvestors
--- In investmentprograms@yahoogroups.com, Suzanna <Suzanna2@...>
wrote:
>
> Hi everyone, I know you guys rely heavily on checking IPs to
determine
> if a program might be a scam or not. I was also under the
impression
> that it could be a help and advised someone concerned about info
on
> GoldPolice.com in regards to SolidInvestment and several other
programs
> having the same IP. Below is his own DD and his response to me
about
> IPs and all the good it will do to check them....
>
> Please note, I am not saying it is a worthless endeavor to check
them,
> just that it isn't the sure sign of a scam.
> :-)
>
> Suzanna
> Read from bottom up.
File - E-gold Trojans and Accounts being hacked...
This is an automated email sent every 2 weeks
Tony P
http://finance.groups.yahoo.com/group/investmentprograms
***
I've been doing some research on the egold trojan and how accounts are
getting hacked. The scary part is that from what I read, most
anti-virus/spyware programs are not going to catch it because it is
not in their databases yet.
Not only that, this trojan does not activate until after you have
logged into your egold and it uses your own computer to bypass every
security measure, IP confirmation, password SRK, everything.
The trojan uses an exploit in IE to infect your computer. DO NOT USE
INTERNET EXPLORER. I can't stress that enough. Download and use
Firefox. Here is a description that I found on how this trojan works:
This Trojan does not employ usual phishing techniques, like logging
user keystrokes in text files that can be sent to a remote malicious
user. Instead, whenever a user tries to access the
e-gold account login form via the URL
http://e-gold.com/acct/login.html, it opens a hidden duplicate
Internet Explorer (IE) window accessing that same URL. It then
proceeds to fill up the duplicate Web form, which eventually leads to
illegal account access.
The Trojan periodically drains the funds of the compromised account by
a certain percentage. The stolen funds are then transferred to another
e-gold account.
To be able to successfully perform this function, this Trojan uses
IE's built-in Object Linking and Embedding (OLE) automation functions.
This method is similar to API hooks used by file-infectors. In this
case, this Trojan executes certain functions for every change in the
URL address that occurs while the user continues to navigate through
the following e-gold Web pages:
* e-gold.com/acct/acct.asp
* e-gold.com/acct/balance.asp
* e-gold.com/acct/spend.asp
* e-gold.com/acct/verify.asp
* https: //www.e-gold.com/acct/acct.asp
* https: //www.e-gold.com/acct/balance.asp
* https: //www.e-gold.com/acct/spend.asp
(Note: Object Linking and Embedding (OLE) is a compound document
standard that enables a user to create objects with one application
and then link or embed them in another application.)
The Trojan runs on Windows 95, 98, ME, NT, 2000, and XP.
You all need to check your computers for the file named gdiwxp.dll.
This is the most recent variant of the trojan that I could find and
was still popping up in late March. If you have this file on your
computer, you are infected with the egold trojan and and you need to
get rid of it immediately.
I don't know if the file will show up with a simple file search, it
may be a hidden. I used Hijack This to look at my registry for the file.
You can download Hijack This for free at:
http://www.download.com/HijackThis/3000-8022_4-10227353.html
This program is mainly used by people so that they can post a registry
log in the tech forums and ask for help. Don't remove anything in your
registry unless you know what you are doing. Just look for the file
containing gdiwxp.dll.
So far there are 2 known variants of the egold trojan:
gdiw2k.sys and gdiwxp.dll.
If you find the trojan on your computer, you can use Security Task
Manager to get rid of it.
http://www.neuber.com/taskmanager/
I also noticed that RegRun has this file in their trojan database and
can remove it for you.
http://www.greatis.com/appdata/d/g/gdiwxp.dll.htm
Again, DO NOT USE INTERNET EXPLORER!!!!!!
Mozilla Firefox browser download
Edited to add: I posted this information on another forum and within
five minutes someone who had their egold hacked on March 31st found
the gdiwxp.dll file on their computer so this must still be the one
making the rounds. They also posted that after they were hacked, they
started using Firefox with no problems.
One of the symptoms that you are infected with this trojan is that you
get the wrong turing number page (at egold) every time you try to log
in. On the page you are redirected to, the links at the top of the
page will not work.
File - Before you invest
To participate in HYIP programs, you must have at least an e-gold account.
You can sign up for free here.
http://www.e-gold.com/e-gold.asp?cid=509611
---
Moneybookers are here.
https://www.moneybookers.com/app/?rid=762214
---
Pecunix is another payment method.
---
All the best,
Tony P
http://myhyipworld.com
http://www.myhyipworld.com/AAI.htm
http://finance.groups.yahoo.com/group/investmentprograms
http://www.easyresponders.com/subscribe.aspx?u=1231/1490
http://finance.groups.yahoo.com/group/AAInvestors
***
File - IP Checks
To perform an IP check simply visit...
http://www.domainwhitepages.com and type in the HYIP address i.e. hyip.com, make sure that you omit the http:// and www.
***
The Way I use the IP Ranges...
I will only invest into what I can research. If the first 3 numbers
of a BAD IP comes up then I do no more DD on them. Yes I agree that
I will miss out on some programs that will continue to pay out. But
I do not take that chance with my money and only invest into what I
think is "safe".
SHG / Comgest etc....are just a line of programs that I have missed out, agreed they paid, but then again I never invested in Brideby / Ezbucks and others from years ago that were paying for a considerable amount of time.
(my loss I know)...but...
If I told you to invest into .....
www.hyipscammersthatwilltakeyourmoney.com .....
because they have paid out for over 9 months and I cannot see them
stopping! Would you invest with them, would you follow the rest of
the Lemmings ( no offence to you or anyone else! ) and deposit your
money? Or would you do some research on them before investing? I
used to be a Lemming myself... Many, many moons ago........
It only takes about 1 minute to perform an IP check...
The method that I use, to me and others, is the only safest way to
play this game. Fair enough I will have missed out on some pretty
good profits...but then again I may have lost a lot of money also.
This is where the IP range comes into play... If they host with a
company that has anonymous registrations. You will never get the
information from the hosting provider and you will never know if the
information on their website is real or not. I could of course
research them after the Initial IP check, but I put them on the back
burner because of this and move to the next, as I do not have enough
hours in the day to check on every HYIP out there!
The admins of a few HYIP programs have already expressed their opinions
about me via emails and DDOS attacks on my previous websites in the past.
(I don`t blame them!). My messages are clear. If you own an HYIP and run
off with the funds, you can guarantee that I will display the names and IPs
of all who do this to us. They will not get away with setting up another
one on the same IP / Hosting DNS provider, as you, like me hate being taken
for a ride!
I also know that this group contains admins from some HYIP.
It is free to join the group and I do not restrict this.
After all we all want free information and we are entitled to it!
Whether you use this method is up to you and no one else can make that
decision, but you. However I have only been bitten by a few that have
slipped through the DD Checks and I can actually say that I make a
decent profit from the HYIP arena...
Hope this makes some sort of sense?
All the best,
Tony P
http://myhyipworld.com
http://www.myhyipworld.com/AAI.htm
http://finance.groups.yahoo.com/group/investmentprograms
http://www.easyresponders.com/subscribe.aspx?u=1231/1490
http://finance.groups.yahoo.com/group/AAInvestors
http://finance.groups.yahoo.com/group/HYIPGames
***
File - Readme9
http://finance.groups.yahoo.com/group/investmentprograms/message/15450
All the best,
Tony P
http://myhyipworld.com
http://www.myhyipworld.com/AAI.htm
http://finance.groups.yahoo.com/group/investmentprograms
http://www.easyresponders.com/subscribe.aspx?u=1231/1490
http://finance.groups.yahoo.com/group/AAInvestors
http://finance.groups.yahoo.com/group/HYIPGames
***
File - Technical info on IP's Generally...
here:
TCP/IP("stack") is a single set of protocols that can work on top of
each physical network type.
* IP - Internet Protocol: This is the the part of TCP/IP that
handles addressing, routing, and delivery of messages or "packets."
Each computer on the network has an IP address which is what IP sends
to. IP does not guarantee that it's packets will be recieved, only
that it will make it's best effort to deliver the packet.
* ICMP - Internet Control Message Protocol: Like I said, IP only
makes a "best effort" to deliver a packet. When it can't, it turns to
ICMP which sends a message like "host unreachable," "time exceded,"
and "redirect" to name a few. If you've ever used the ping program,
which is supposed to allow you to test whether you can connect to
another machine, it sends an ICMP Echo Request which prompts the other
machine to send an ICMP message back, thus telling you that the remote
machine is connected.
* IGMP - Internet Group Management Protocol: Like ICMP, IGMP is a
subset part of IP. IGMP is responsible for addressing for multicast
messages - i.e. a message meant for many different hosts on different
networks.
* TCP - Transmission Control Protocol: The best protocol in the
TCP/IP suite if you ask me. When I told you about IP, I said that it
doesn't guarantee delivery, it only makes a best effort. TCP is a
protocol that sits on top of IP and makes sure that each packet is
delivered correctly. It does this by having the receiving machine send
a receipt for each set of packets it receives. TCP also uses this
acknowlegment system to make sure that the packets are received and
reassembled in the order they were sent.
* UDP - UDP is TCP without error-checking or message
order-checking. UDP has less overhead, but is not quite as reliable,
so it isn't used very much. The only application I can think of off
the top of my head is TFTP (Trivial File Transfer Protocol) which is
used mainly for sending files over a LAN a short distance. It doesn't
have TCP's error checking, so it takes up less bandwidth, but if
something gets lost, no one knows it.
* ARP / RARP - Address Resoluton Protocol / Reverse Address
Resolution Protocol: ARP is used to convert IP addresses into MAC
addresses, while RARP converts MAC addresses to IP addresses.
MAC addresses for addressing is used in Ethernet.
The Internet Assigned Numbers Authority (IANA) has reserved the
following three blocks of the IP address space for private internets:
* 10.0.0.0 - 10.255.255.255 (10/8 prefix)
* 172.16.0.0 - 172.31.255.255 (172.16/12 prefix)
* 192.168.0.0 - 192.168.255.255 (192.168/16 prefix)
Request for IP addresses should be sent to one's ISP who then
registers with one of the following regional registries:
* APNIC (Asia-Pacific Network Information Center)
<http://www.apnic.net>
* ARIN (American Registry for Internet Numbers )
<http://www.arin.net>
* RIPE NCC (Reseau IP Europeens) <http://www.ripe.net>
* INTERNIC (Internet Network Information Center)
<http://www.internic.net>
**INTERNIC is the top level Internet registry. It also administers
the North America region
"IP number" is a four byte value that, by convention, is expressed by
converting each byte into a decimal number (0 to 255)
The end user can install TCP/IP on a personal computer without any
knowledge of either the corporate or regional network. Three pieces of
information are required:
1. The IP address assigned to this personal computer
2. The part of the IP address (the subnet mask) that distinguishes
other machines on the same LAN (messages can be sent to them directly)
from machines in other departments or elsewhere in the world (which
are sent to a router machine)
3. The IP address of the router machine that connects this LAN to
the rest of the world.
In the case of the PCLT server, the IP address is 130.132.59.234.
Since the first three bytes designate this department, a "subnet mask"
is defined as 255.255.255.0 (255 is the largest byte value and
represents the number with all bits turned on). It is a Yale
convention (which we recommend to everyone) that the router for each
department have station number 1 within the department network. Thus
the PCLT router is 130.132.59.1. Thus the PCLT server is configured
with the values:
* My IP address: 130.132.59.234
* Subnet mask: 255.255.255.0
* Default router: 130.132.59.1
MORE DETAILED:
The IP address is the number that is assigned to your computer's
Internet interface (modem / network card) as an ID on the Internet or
any other TCP/IP Network for that matter. It is "attached" to the MAC,
or machine hardware address for your computer's modem or network card.
The format for IP addresses is four sets of no more than three numbers
separated by periods (xxx.xxx.xxx.xxx).
If a given device has more than one network interface (i.e. two
network cards and a modem) AND each has it's own IP in the network, it
is known as multi-homed. A good example of this would be a router, or
a hardware firewall. Each device has at least two network interfaces,
one for the Internet side, and one for the LAN side, each with it's
own IP address.
It would be very hard to route data over a TCP/IP network if the IP
addressing system didn't have some organization to it. As you know,
the Internet is a large network of smaller networks, so it would make
sense to have a particular range of IPs that are known to be assigned
to each network. This makes physical and logical routing much easier.
It happens that by reading the first part of an IP you can determine
the network it is located on, but this is where it gets a little
tricky. Because of the fact that different size networks need
different numbers of IPs, three basic IP address classes were created
- Class A, Class B, and Class C.
* Class A IPs use the first set of numbers to identify the network
(10.xxx.xxx.xxx). These addresses range from 1.xxx.xxx.xxx to
127.xxx.xxx.xxx, and are reserved for large networks and backbones
like Comcast since each network contains over 16 million hosts.
* Class B IPs use the first two sets for a network ID
(172.16.xxx.xxx). These addresses range from 128.xxx.xxx.xxx to
191.xxx.xxx.xxx, contain 65,534 hosts per network.
* Last, but not least, we have the Class C IPs. They use the first
three sets for a network ID (192.168.0.xxx), and range from
192.xxx.xxx.xxx to 223.xxx.xxx.xxx. Each network contains 254 hosts.
At this point, you may be saying, "Pete, why do the Class C addresses
stop at 223.xxx.xxx.xxx? Can't I have a 346.xxx.xxx.xxx IP address?"
Well, no you can't. The reason is the way that computers handle
numbers. Binary numbers (0's and 1's) are used in IP addresses (an
8-bit binary number for each set of 3 numbers to be precise). If you
are familiar with binary numbering, then you know that an 8-bit binary
number can only handle the numbers 0-255.
To answer the original question, most of the IP numbers above
223.xxx.xxx.xxx are either reserved for research or for "future use".
Another thing that limits the number of useable IPs is the number of
IPs that are reserved for special functions like troubleshooting. Here
is a brief list of the ones I can think of off the top of my head, and
that I use a lot:
* 255.xxx.xxx.xxx - Addresses starting with 255 are reserved for
calculations involved in subnetting
* xxx.xxx.xxx.0 - Addresses that end with a single 0 are called
network addresses. They are a shorthand way of describing a whole
network. For example, my home network (192.168.1.1 - 192.168.1.254)
could be described as 192.168.1.0.
* 127.0.0.1 - This address is very useful. It's the loopback
address, and essentially, this tells the computer to send to itself.
It is used to determine whether your TCP/IP stack is correctly configured.
* xxx.xxx.xxx.255 - Any address that ends in 255 is a broadcast
address and will send to all nodes on your subnet/network.
There is also a special set of IPs that have been set aside for
"private network" use. They will never be included on the Internet,
and there is one range for each IP address class:
* Class A - 10.0.0.0 -> 10.255.255.255
* Class B - 172.16.0.0 -> 172.31.255.255
* Class C - 192.168.0.0 -> 192.168.255.255
If you are just setting up a small LAN you can use the 192.168.0.0
range like I did. My LAN uses 192.168.1.1 - 192.168.1.254 so I have up
to 254 numbers to assign. Lucky for me, I only have 13 computers, and
only 6 of them are connected to the network (for now :-) so I don't
need to worry about assigning all the IPs by hand. If you are setting
up more computers than I am, and you're lazy (a lot like I am) you may
want to consider using DHCP.
About Dynamic Host Configuration Protocol:
If you've ever dialed-up for Internet service, you've probably used
DHCP and not known it. If you've dialed-up and didn't understand
anything I said above in the TCP/IP section, then you definitely used
DHCP.
As the name suggests, DHCP automatically assigns an IP (and other
settings if you so choose) to your computer when it boots up.
Essentially, you set up one of your computers on the network to have a
DHCP server, and give it a range of IP addresses to take care of, for
example our 192.168.1.1 - 192.168.1.254 network. Each of the other
computers is set to "Obtain an IP address automatically" and when it
boots up, it probes the network looking for a DHCP server. The server
responds, and sends the computer an IP to use from the list of IPs it
has to administer. The IP is given on a lease, typically of a week or
so, that that computer is allowed to use the IP for. When the time
expires, the computer must request that the lease be renewed, or it
gets kicked off of the network.
DHCP, while not used in smaller networks, is good to be aware of in
case you have a smaller number of IPs than computers, thus requiring
the IPs to be shared among them, or when you have a HUGE number of
computers and don't feel like going to the trouble of assigning IPs to
each one.
SUBNET:
Lets say for a second that we want to keep it as 1 network of 254
hosts and that we have been assigned to use the Class C network
192.168.1.0. Why 254 hosts or "combinations" and not 256 as an 8-bit
binary number should allow? Well, remember that we can't use
192.168.1.0 since that is the network identifier address, and we can't
use 192.168.1.255 since that is the broadcast address. We can assign
192.168.1.1-192.168.1.254, or 254 hosts.
Notice how the first three octets of our subnet mask are set to 255?
255 in binary is 11111111. The last octet is 0. 0 in binary is
00000000. See a pattern forming? Octets that are all 1's in binary
identify the part of the address that identifies the network, while
those that are all 0 identify usable host slots.
For more subneting go to: http://noc.skilmnet.net/learn/tcpip/routing.html
Ipsens
File - DD Guide Template WIP.pdf
Description : Part One of doing Due Diligence
Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
File - Welcome new members...
Welcome to our group.
These are challenging times. You need to learn how to look up programs
[DD or Due Diligence] and see what sort of information is given.
Go to http://www.domainwhitepages.com/
and where it says "domain or
IP address" put in the domain name of a program.
A URL is http://www.domainwhitepages.com
A DOMAIN is domainwhitepages.com
[Strip the http://www. from the beginning and the "/" from the end to
get the domain.]
Study the IP 221.123.84.12 and then check it. That is an IP I made up
- an IP has 4 sets of numbers with a full stop between each set. There
may be from 1 to 3 numbers in each set.
We use the first 3 sets of numbers as a guide to domain addresses that
have had failed or scam programs running on them. Often a scammer will
use the same server to run his next program on.
Our advice here is that if the first 3 numbers match those on the BAD IP
list http://www.easyresponders.com/subscribe.aspx?u=1231/1314
Next look at the date the program started and how long it is registered
for.
Look at phone numbers 111111111111 is not a phone number nor is
123456789 etc. If the number looks silly - it indicates the program
owner is hiding or considers the users of his program not to be very smart.
Is the address real - is the postcode possible? You have to look at all
details.
Make it a habit to ask a question via the "contact" on the opening page
of the program. Try to think of something not in the FAQ or ask for
clarification about something in the FAQ section. This establishes that
the owner will reply to messages.
Do this before you spend a cent.
Ask if others in this group are in the program. If you don't
understand something - ask - the worst mistake you can make is not to ask.
Lets hope we can help you find reliable paying HYIP and Surf sites.
Regards,
Judith
File - investing stratagies.doc
Description : Investmentprograms member "Tom R" advice on HYIPs
Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
Yahoo! Groups: Welcome to investmentprograms. Visit today!
Welcome to the investmentprograms group.
The only place to discuss and share your HYIP scams.
Please take a moment to review this message.
PLEASE READ OUR "TERMS FOR JOINING THIS GROUP. ALL ADVERTISED REFERRAL LINKS FOR PROGRAMS WILL RESULT IN YOU BEING BANNED FROM THIS GROUP". I hope you understand...
***
TERMS OF JOINING...
You must have a Yahoo ID to join. NO ID = CANNOT JOIN
Posts regarding anything other than a relation to HYIP will be rejected.
REFERRAL LINKS = DELETED POSTS and Moderated with a possible BAN
DOUBLERS AND QUICK MONEY MAKERS = DELETED POSTS and Moderated with a possible BAN
SPAM = AUTOMATIC BAN
BOUNCING EMAIL ACCOUNTS = YOU WILL BE DELETED ON A MONTHLY BASIS
STRONG / ABUSIVE LANGUAGE = AUTOMATIC BAN
( Please keep it civil... )
IF you have been banned the ONLY way to rejoin if you wish is to use another Yahoo ID.
I WILL NOT RESTORE YOUR OLD ID.
***
If you have any questions please do not hesitate to ask them.
To learn more about the investmentprograms group, please visit...
http://finance.groups.yahoo.com/group/investmentprograms
To start sending messages to members of this group, simply send an email to...
investmentprograms@yahoogroups.com
If you do not wish to belong to our group anymore, you may easily unsubscribe by sending an email to...
investmentprograms-unsubscribe@yahoogroups.com
To see and modify all of your groups, go to
http://groups.yahoo.com/mygroups
And please remember....NO referral links....
All the best,
Tony P:)
http://myhyipworld.com
http://finance.groups.yahoo.com/group/investmentprograms
http://finance.groups.yahoo.com/group/HYIP_Newsletter
***
Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
File - Welcome
Thank you for joining us today - I hope you learn what you need to
know from our group.
Note: Programs with very high short term profits are classified as
games. for example something that offers 10%, or 20% or more a day.
Join HYIPGames group to discuss games
http://finance.groups.yahoo.com/group/HYIPGames
If a program has a sound website, carefully planned future and you think
others may wish to join it - you put the program's name/address in the
subject, describe the program in the body and suggest that if others
wish to join it they can get their link from you.
Then put your email address in the body of the email where it can be seen:
galingale@chariot.net.au
as an example.
Private discussions keep off-group please.
Regards,
Judith
File - Tony P's New Secret Weapon
This is an automated email sent every 2 weeks.....
Tony P
http://finance.groups.yahoo.com/group/investmentprograms
***
I have created a new GAMES group:
http://finance.groups.yahoo.com/group/HYIPGames
You are more than welcome to join us and learn about how to play and which ones are paying....
***
Below is a system that I have been working on over the last 6-12 Months ;)
Again, I could go and sell this "Secret" for Millions of Dollars and be off.
However in the tradition to that I am more accustomed to, this will not be the
case!
Again just like the IP List this is to be used as a "Tool" to aid you whether
you should invest in any program on the internet.
It is a system that I have used now for the last 6 months myself.
By using this information below, along with the "Bad IP List" I have managed to
make a profit from the admins over a period of time...
The "Average Lifespan" is just that...It is an accumulation of all of the data
that I have collected and it is my best deduction as to how long they will stay
up and paying for!
The "Expected Lifespan" again is my best deduction of previous websites as to
how long they will stay based on the data collected.
% Payouts Quoted on the site:
101% - 200% after 1 day
110% - 120% after 1 day
120% - 125% after 1 day
120% - 140% after 1 day
120% - 150% after 1 day
120% - 160% after 1 day
120% - 180% after 1 day
120% - 200% after 1 day
120% - 220% after 1 day
125% - 155% after 1 day
130% - 160% after 1 day
130% - 165% after 1 day
130% - 170% after 1 day
130% - 180% after 1 day
130% - 190% after 1 day
130% - 200% after 1 day
130% - 240% after 1 day
130% - 300% after 1 day
135% - 180% after 1 day
135% - 215% after 1 day
135% - 250% after 1 day
140% - 175% after 1 day
140% - 185% after 1 day
160% - 240% after 1 day
130% - 150% after 2 days
140% - 260% after 2 days
145% - 270% after 2 days
150% - 160% after 2 days
150% - 190% after 2 days
150% - 200% after 2 days
150% - 185% after 2 days
160% - 215% after 2 days
160% - 260% after 2 days
162% - 320% after 2 days
165% - 230% after 2 days
170% - 200% after 2 days
170% - 300% after 2 days
175% - 250% after 2 days
175% - 320% after 2 days
180% - 220% after 2 days
185% - 225% after 2 days
190% - 275% after 2 days
195% - 310% after 2 days
200% - 480% after 2 days
220% - 260% after 2 days
230% - 270% after 2 days
245% - 295% after 2 days
260% - 380% after 2 days
160% - 180% after 3 days
160% - 300% after 3 days
170% - 330% after 3 days
190% - 250% after 3 days
210% - 290% after 3 days
220% - 340% after 3 days
220% - 400% after 3 days
225% - 420% after 3 days
240% - 385% after 3 days
245% - 310% after 3 days
250% - 295% after 3 days
250% - 315% after 3 days
380% - 420% after 3 days
390% - 570% after 3 days
33% - 38% daily for 4 days
144% - 156% after 4 days
400% - 444% after 4 days
420% - 460% after 4 days
245% - 300% after 5 days
300% - 560% after 5 days
375% - 450% after 5 days
400% - 440% after 5 days
350% - 415% after 7 days
450% - 600% after 7 days
650% - 750% after 7 days
500% - 1000% after 8 days
If you see any combinations of the above plans
Average HYIP Lifespan: around 4 days
Expected HYIP Lifespan: between 0-20 days
***************************************************
% Payouts Quoted on the site:
2.1% - 2.9% daily
Average HYIP Lifespan: around 126 days
Expected HYIP Lifespan: around 37-521 days
***************************************************
% Payouts Quoted on the site:
4.25% - 5.5% daily for 40 days
35% - 40% weekly for 5 weeks
23% - 50% daily for 5 days
If you see any combinations of the above plans
Average HYIP Lifespan: around 82 days
Expected HYIP Lifespan: around 2-345 days
***************************************************
% Payouts Quoted on the site:
0.1% - 1.5% daily for 150 trading days
8% - 12% weekly for 52 weeks
If you see any combinations of the above plans
Average HYIP Lifespan: around 114 days
Expected HYIP Lifespan: around 19-286 days
***************************************************
% Payouts Quoted on the site:
25% - 30% daily for 5 days
150% - 200% after 5 days
If you see any combinations of the above plans
Average HYIP Lifespan: around 17 days
Expected HYIP Lifespan: around 2-57 days
***************************************************
% Payouts Quoted on the site:
2.5% daily for 60 trading days
3% daily for 65 trading days
4% daily for 70 trading days
5% daily for 80 trading days
If you see any combinations of the above plans
Average HYIP Lifespan: around 54 days
Expected HYIP Lifespan: around 6-271 days
***************************************************
% Payouts Quoted on the site:
125% - 300% after 1 day
250% - 600% after 2 days
600% - 1050% after 5 days
If you see any combinations of the above plans
Average HYIP Lifespan: around 2 days
Expected HYIP Lifespan: around 0-9 days
The dead giveaway in this one is the 600% - 1050% after 5 days Plan...they will
not be around to pay you!
***************************************************
% Payouts Quoted on the site:
16% - 20% daily for 10 days
170% - 180% after 7 days
135% - 140% after 3 days
If you see any combinations of the above plans
Average Lifespan: around 100 days
Expected Lifespan: around 18-206 days
***************************************************
% Payouts Quoted on the site:
40% daily for 3 days
40% - 45% daily for 3 days
16% - 20% daily for 10 days
133% - 144% after 3 days
135% - 140% after 3 days
30% - 40% daily for 4 days
195% - 205% after 6 days
150% - 170% after 7 days
170% - 180% after 7 days
200% after 7 days
360% - 365% after 10 days
620% after 14 days
325% - 375% after 30 days
If you see any combinations of the above plans
Expected HYIP Lifespan: around 2-35 days
Average HYIP Lifespan: around 12 days
***************************************************
% Payouts Quoted on the site:
1% daily for 300 trading days
Average HYIP Lifespan: around 73 days
Expected HYIP Lifespan: around 12-186 days
***************************************************
% Payouts Quoted on the site:
0.8% - 2.6% daily
2% - 3.4% daily
If you see any combinations of the above plans
Average HYIP Lifespan: around 126 days
Expected HYIP Lifespan: around 37-521 days
***************************************************
% Payouts Quoted on the site:
5% - 7% daily for 50 trading days
5% - 6% daily for 200 trading days
3500% after 90 days
If you see any combinations of the above plans
Average HYIP Lifespan: 69 days
Expected HYIP Lifespan: 10-261 days
***************************************************
% Payouts Quoted on the site:
0.68% daily for 365 trading days
Average HYIP Lifespan: 136 days
Expected HYIP Lifespan: 16-366 days
***************************************************
% Payouts Quoted on the site:
1.8% - 3% daily
3% - 6% daily for 60 trading days
If you see any combinations of the above plans
Average HYIP Lifespan: 75 days
Expected HYIP Lifespan: 8-156 days
***************************************************
% Payouts Quoted on the site:
11% - 15% daily for 10 trading days
115% - 180% after 14 days
20% - 50% weekly for 7 weeks
100% - 150% monthly for 3 months
If you see any combinations of the above plans
Average HYIP Lifespan: 21 days
Expected HYIP Lifespan: 0-56 days
***************************************************
% Payouts Quoted on the site:
1.9% daily for 150 days
2% - 3% daily for 60 trading days
15% weekly for 22 weeks
65% monthly for 5 months
200% - 250% after 60 days
If you see any combinations of the above plans
Expected HYIP Lifespan: 12-186 days
Average HYIP Lifespan: 73 days
***************************************************
% Payouts Quoted on the site:
1% daily for 150 trading days
1.7% - 2.3% daily for 180 trading days
2% - 4% daily for 200 trading days
5% weekly for 30 weeks
9.7% - 10.1% weekly for 52 weeks
39.9% monthly for 14 months
If you see any combinations of the above plans
Expected HYIP Lifespan: 18-206 days
Average HYIP Lifespan: 100 days
***************************************************
% Payouts Quoted on the site:
5% - 8% daily for 40 days
Expected HYIP Lifespan: 10-261 days
Average HYIP Lifespan: 69 days
***************************************************
% Payouts Quoted on the site:
10% daily for 15 trading days
Average HYIP Lifespan: 60 days
Expected HYIP Lifespan: 10-261 days
***************************************************
% Payouts Quoted on the site:
25% - 35% daily for 6 days
Average HYIP Lifespan: 11 days
Expected HYIP Lifespan: 2-24 days
***************************************************
% Payouts Quoted on the site:
2.22% daily for 150 days
Average HYIP Lifespan: 126 days
Expected HYIP Lifespan: 37-521 days
***************************************************
% Payouts Quoted on the site:
18% daily for 100 days
Average HYIP Lifespan: 18 days
Expected HYIP Lifespan: 0-56 days
***************************************************
% Payouts Quoted on the site:
33% daily for 4 days
450% after 14 days
2500% after 30 days
If you see any combinations of the above plans
Expected HYIP Lifespan: 6-43 days
Average HYIP Lifespan: 12 days
***************************************************
% Payouts Quoted on the site:
105% - 110% after 1 day
110% - 120% after 1 day
115% after 1 day
130% after 1 day
60% daily for 2 days
60% - 70% daily for 2 days
65% - 75% daily for 2 days
75% daily for 2 days
47% - 50% daily for 3 days
20% daily for 3 days and principal back
45% daily for 3 days
50% - 60% daily for 3 days
55% - 65% daily for 3 days
40% daily for 4 days
270% after 4 days
25% daily for 5 days and principal back
300% - 500% after 7 days
If you see any combinations of the above plans
Expected HYIP Lifespan: 0-26 days
Average HYIP Lifespan: 11 days
***************************************************
If you see any site offering these ridiculous Plans below...run away as they
will run off with your money...If you are a diehard gambler then be my guest...I have heard nothing but trouble from these % payers...AVOID at all costs...
% Payouts Quoted on the site:
120% - 250% after 1 day
170% - 280% after 1 day
180% - 200% after 1 day
180% - 240% after 1 day
200% - 210% after 1 day
200% - 250% after 1 day
200% - 300% after 1 day
200% - 500% after 1 day
210% - 230% after 1 day
210% - 240% after 1 day
180% - 500% after 2 days
240% - 350% after 2 days
300% - 310% after 2 days
300% - 340% after 2 days
320% - 350% after 2 days
325% - 380% after 2 days
350% - 400% after 2 days
360% - 400% after 2 days
470% - 500% after 3 days
500% - 600% after 3 days
360% - 400% after 7 days
500% - 1000% after 7 days
900% - 1200% after 7 days
Expected HYIP Lifespan: 0-6 days
Average HYIP Lifespan: 0-1 days
***************************************************
It may be worth printing out this file so you can have it handy when researching
your new HYIP.
Take care and all the best,
Tony P
http://myhyipworld.com
http://www.myhyipworld.com/AAI.htm
http://finance.groups.yahoo.com/group/investmentprograms
http://www.easyresponders.com/subscribe.aspx?u=1231/1490
http://finance.groups.yahoo.com/group/AAInvestors
http://finance.groups.yahoo.com/group/HYIPGames
***
File - Readme
Hackers can very easily gain access to your computer without you
knowing.
Visit http://www.dshield.org Click on "Are you cracked, click here to see".
These check your computer to see if it has been hijacked by hackers.
Remember to use Virus Detection constantly also.
use AVG, its FREE and is constantly freely updated. There are many free versions available...
http://free.grisoft.com
Also consider Bitdefender...
http://www.bitdefender.com
Another online scanner that Is particulary recommended is:
http://origin-hc.trendmicro.com/housecall/reqloc.htm
Use it to scan for Virus and Spyware before AND after EVERY Surf / HYIP login...
Make sure you scan everday for trojans and spyware...Again there are many of them out there...
Adaware is here...
http://www.lavasoft.de/
Spybot is here...
http://www.download.com/3000-8022-10122137.html
Xofspy is here...
http://paretologic.com/products.aspx
Rootkits are becoming more popular to the hacking world...
Get your protection here...
http://www.f-secure.com/solutions/home.shtml
and of course zonealarm free software firewall...
http://www.zonelabs.com/store/content/company/products/znalm/freeDownl
oad.jsp
From personal experience ... get a Hardware Firewall, they cost very little, but they encrypt your Data and secure your PC better than ANY Software Firewall.
If you don`t protect yourself, you may as well be throwing your money down the drain. Don`t take ANY chances and make sure your PC is SAFE to use.
Don`t forget that there are more files to download from the website. Check out the files section on yahoo groups.
All the best,
Tony P
http://myhyipworld.com
http://www.myhyipworld.com/AAI.htm
http://finance.groups.yahoo.com/group/investmentprograms
http://www.easyresponders.com/subscribe.aspx?u=1231/1490
http://finance.groups.yahoo.com/group/AAInvestors
http://finance.groups.yahoo.com/group/HYIPGames
***
Request to join investmentprograms approved
The moderator of the investmentprograms group has approved your request for membership.
Here are a few key tips to get you started:
* To learn more about the investmentprograms group, please visit
http://groups.yahoo.com/group/investmentprograms
* To post a message to this group, send email to
investmentprograms@yahoogroups.com
* To contact the moderator of this group, send email to
investmentprograms-owner@yahoogroups.com
* To unsubscribe from this group, send email to
investmentprograms-unsubscribe@yahoogroups.com
Thank you for choosing Yahoo! Groups as your email group service.
Regards,
Yahoo! Groups Customer Care
Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
File - PC Security 2
Hi folks,
Here is a text about security posted at HYIP Pro forum. Very interesting:
"A BRIEF INTRODUCTION TO INTERNET SECURITY
To start off with, the subject of internet security is probably the single most
important subject to consider when dealing with money, or currencies on the
internet. Hacking has become a major problem that cannot be ignored. There are
many methods used by the hackers of our time, and they are figuring out new ways to do it every single day.
SpyWare and Keylogging programs are one of the most practiced forms of gaining information that is used to rob individuals of their funds from accounts on the internet. It is also used to gain information so a hacker can gain entry to any program that you may belong to. I am going to outline some methods to thwart hackers, and I am going to list some very good programs that can be acquired for free, and some that cost money. It is my personal opinion that if you purchase the best security you will have the best security, and if you intend to protect programs that involve a good deal of money, then you should consider the purchase of the best software to be a really good investment. So ... lets get started.
ABOUT FIREWALLS
This section is reprinted from Shields Up
A firewall ABSOLUTELY ISOLATES your computer from the Internet using a "wall of
code" that inspects each individual "packet" of data as it arrives at either
side of the firewall - inbound to or outbound from your computer - to determine
whether it should be allowed to pass or be blocked
How does a Firewall Work?
All internet communication is accomplished by the exchange of individual
"packets" of data. Each packet is transmitted by its source machine toward its
destination machine. Packets are the fundamental unit of information flow across the Internet. Even though we refer to "connections" between computers, this "connection" is actually comprised of individual packets travelling between those two "connected" machines. Essentially, they "agree" that they're connected and each machine sends back "acknowledgement packets" to let the sending machine know that the data was received.
In order to reach its destination - whether it's another computer two feet away
or two continents distant - every Internet packet must contain a destination
address and port number. And, so that the receiving computer knows who sent the
packet, every packet must also contain the IP address and a port number of the
originating machine. In other words, any packet travelling the net contains -
first and foremost - its complete source and destination addresses. As we've
seen earlier on this site, an IP address always identifies a single machine on
the Internet and the port is associated with a particular service or
conversation happening on the machine.
Look what this means! . . .
Since the firewall software inspects each and every packet of data as it arrives at your computer - BEFORE it's seen by any other software running within your computer - the firewall has total veto power over your computer's receipt of anything from the Internet.
A TCP/IP port is only "open" on your computer if the first arriving packet which requests the establishment of a connection is answered by your computer. If the arriving packet is simply ignored, that port of your computer will effectively disappear from the Internet. No one and nothing can connect to it!
But the real power of a firewall is derived from its ability to be selective
about what it lets through and what it blocks. Since every arriving packet must
contain the correct IP address of the sender's machine, (in order for the
receiver to send back a receipt acknowledgement) the firewall can be selective
about which packets are admitted and which are dropped. It can "filter" the
arriving packets based upon any combination of the originating machine's IP
address and port and the destination machine's IP address and port.
So, for example, if you were running a web server and needed to allow remote
machines to connect to your machine on port 80 (http), the firewall could
inspect every arriving packet and only permit connection initiation on your port 80. New connections would be denied on all other ports. Even if your system were to inadvertently pick up a Trojan horse program which opened a Trojan listening port to the outside world, no passing Trojan scanner could detect or know of the Trojan's existence since all attempts to contact the Trojan inside your computer would be blocked by the firewall!
Or suppose that you wish to create a secure "tunnel" across the Internet to
allow your home and office computers to share their files without any danger of
unauthorized intrusion. Firewall technology makes this possible and relatively
simple. You would instruct the firewall running on your office computer to
permit connections on the NetBIOS file sharing ports 137-139 only from the IP
address of your home computer. The firewall running on your home machine would
similarly be instructed to permit connections on ports 137-139 only from your
office machine's IP address. Thus, either machine can "see" the other's NetBIOS
ports, but no one else on the Internet can see that either machine has
established such a secure tunnel across the Net.
But what about you originating your own connections to other machines on the
Internet? For example, when you surf the web you need to connect to web servers
that might have any IP address. You wouldn't want all those to be blocked just
because you want to block everyone from getting into your machine. It turns out
that this is easy for a firewall too. Since each end of an Internet connection
is always acknowledging the other end's data, every packet that flows between
the two machines has a bit set in it called the "ACK" bit. This bit says that
the packet is acknowledging the receipt of all previous data. But this means
that only the very first packet which initiates a new connection would NOT be
acknowledging any previous data from the other machine. In other words, a
firewall can easily determine whether an arriving packet is initiating a new
connection, or continuing an existing conversation. Packets arriving as part of
an established connection would be allowed to pass through the firewall, but
packets representing new connection attempts would be discarded. Thus, a
firewall can permit the establishment of outbound connections while blocking any new connection attempts from the outside.
Another example of the power of a high-quality firewall is "application level"
filtering and response: Most firewalls do pretty much what I've explained above, and this affords tremendous protection.
But they don't attempt to "understand" the data in the packets they're admitting or blocking. Their "permit" or "deny" decisions are only based upon the source and destination addresses. But an "application level" firewall involves itself in the actual dialog taking place.
For example, we've seen that one of the biggest problems with Microsoft's file
and printer sharing is its lack of ability to prevent password crackers from
pounding away on a password until it's broken. But an intelligent application
level firewall can monitor what's happening on port 139 (where password
protection occurs) and step in to completely block an offending remote computer!
It can automatically "black list" the originating IP address to completely
prevent any and all future access from that outsider.
I hope I've conveyed some sense for the powerful benefits and features created
by firewalls. At a cost ranging from $29 to $39 USD, these personal firewalls
are a terrific bargain! If you have also received the sense that this can be
very tricky stuff I'd have to agree.
THE MECHANICAL FIREWALL
A mechanical firewall, such as a NAT router or a DSL modem, and software
firewalls such as Zone Alarm, System Suites Net Defense, Norton Personal
Firewall, and others too numerous to mention. My preference is Norton. A NAT
router, such as Linksys, actually acts as a mechanical barrier between the
internet and your PC. There are many on the market and a good computer store
will carry a good selection of the best of them. Be sure, though, that your
system has one of the following, an ETHERNET or a USB port present and open.
This will be necessary to utilize a NAT router. If you dont have this on your
PC, then you can purchase a PCI card that will add this to your system. The
ETHERNET connection is the preferred connector for a router. A DSL modem also
acts as a mechanical barrier between the internet and your PC. Most of the time
if a hacker sends a mass ping out, a DSL modem, or a router is what he will see
on the ping. Not your computer. Regular dial-up, and cable modems are not quite
as secure as DSL. So, if you want to really be secure, then start with a NAT
router. If you have DSL, then you wont need a router unless you want to link to
the net with several computers.
THE SOFTWARE FIREWALL
A software firewall, in a way sort of confuses a hackers attempts and even in
some cases logs the hackers attempts at entry into your system. Software
firewalls can be an extremely effective way to thwart a hacker and protect your
sensitive data. You can set a software firewall to conform to your individual
needs and most software firewalls have a good help system and directions to aid
you in the setup of the software. A good software firewall enhances and
strengthens a good mechanical firewall. A mechanical and a software firewall
work hand-in-hand with each other to make your system invisible to hackers.
There are several good firewall programs available, and a search via google
using "firewall" as the subject will get you a list of them to look over. My
personal preference, as I said is Norton Personal Firewall. I'll cover that in
more detail later in this guide.
SPYWARE
Spyware is another thing to consider when developing your personal internet
security. Spyware is very sneakily installed on your computer via free programs, toolbars, smiley face programs, email program addons and even via autosurfing programs.
It also can enter, and so can viruses, in your email as it comes into
your computer daily. Spyware sits in your computer and reads your sensitive data and surfing habits and details of the sites you visit, and sends the info to the person or persons who did the sneaky install.
It is not a very ethical thing to do, but it is done to almost everyone everyday. There are many good stand alone anti-spyware programs available for free download. These include SpyBot Search and Destroy, Spyware Guard, and many others. Again, a search via google will turn up many choices. Just enter "spyware" as the subject. Again, Norton has included anti-spyware in its program, Norton Internet Security, and it is part of Norton AntiVirus.
VIRUS
Spyware can enter your computer in the form of Virus, or Worms, and also
Trojans. A Trojan is named after the "Gift Horse" used in the war between Greece and Troy. And it comes in the form of an innocent or inconspicuous file or program.
It gets into your system and sends out information such as passwords
and ID names to the person, or persons, who installed it or sent it to your PC.
A worm gets into your system by innocent means such as email attachments etc. A
virus can enter your system via any download or email or attachment to an email.
Viruses are the most destructive kind of PC invasion. Some viruses, once
activated, can totally destroy your system's BIOS and can totally wipe out your
hard drive. So a good anti-virus program is vital to good internet security.
So...in summary...A top level internet security system will consist of a
Mechanical Firewall...a Software Firewall...a good Anti-Spyware program...and a
good Anti-Virus program. I am going to list a few of the programs available for
a price and a key word to use to access a variety of free and paid for options
later in this guide.
A good program to self test your security online is called Shields Up. Here is
the link to use it :
https://grc.com/x/ne.dll?bh0bkyd2
PROTECTING YOUR EQUIPMENT
The subject arises of equipment protection. The most common protection devise
used in a home environment is the surge protector. In recent years, the use of
an Uninterruptable Power Supply (UPS) has emerged. A really good UPS has a
feature called Automatic Voltage Control (AVC). There are quite a few
manufacturers of these devices, including Belkin, Cyber Power, APC , and others.
They supply a battery backup to your system during power failures, and they
filter the AC supply to your PC and sensitive equipment. I encourage the use of
one of these. They come in different current ratings, ie..battery sizes. I
recommend one in the 1000 amp / hr range or higher. This would give you a
minimum of 20 to 30 minutes to save any data and turn your system off during a
power failure, and the remaining power in the batteries will keep your smaller
equipment, such as cable or DSL modems powered so they will be ready when power
comes back on. I am including links to the online sites of 2 of these companies.
Usually the battery in these devices will last for about 3 years, and then will
need to be replaced. You can purchase one at any good computer or office supply
store for a reasonable price. Again, this is a premium investment in protection.
PASSWORDS
Next .. lets cover the subject of developing, using, and entering passwords
which are designed to protect entry into your personal pages of the programs you belong to.
RoboForm and RoboForm Pro.....
This program is my personal recommendation for keyless password entry into any
program or site that requires a password, and can also be used to quickly accessthose sites, with one click, that either do or dont require a password. It is a great system that keeps all of your information handy and fills in all kinds of forms.
There are those who debate about keeping a program like this on your PC,
but if you utilize a full internet security program, then this form filler is
safe and can do your password entries without using key strokes. Norton
SystemWorks has a feature called "Password Manager" that does the password part, but RoboForm does it all. I highly recommend that you go ahead and purchase RoboForm Pro. It has unlimited passcards and you can install unlimited custom info fields. It is the greatest information entry time saver available on the net at this time, like I said will securely enter your saved passwords without keystrokes. It also keeps you from forgetting the entry information to all of your programs, and the data can be backed up, so you wont lose it if your PC crashes. It also stores the URLs you need for entry to your programs. I just cant say enough good things about it and I would be lost without it.
Creating and saving passwords to use for any program.....
What I am about to cover here, is a method that I have developed to create
passwords in a stealth mode without using keystrokes at all. I am going to
include an example of creating one and installing it to a program, or site, and
then saving it to RoboForm.
Creating a password using copy and paste is a stealth method that requires no
keystrokes to do it. First, log onto a site that has a lot of text and numbers
in it. Make sure you dont try to copy from a hyperlink or a URL because it will
frustrate you when it goes to that site. What you do is highlite a section of,
or a few letters of a word, and copy it to notepad or wordpad. Then you find
some numbers and highlite 2 or 3 in a row and copy them and paste them onto the
letters you have just pasted on your "pad". Then locate and highlite a few more
random letters and do the same. Repeat this process untill you have created a
password containing numbers and letters. It can be done in any order, and can
inlude upper and lower case letters. each time you complete a potential
password, save the file under a filename you can locate easy, and just start a
new line in this file for each password you create. I would not create more than about 8 - 10 at any one time. For instance, I will create 3 passwords here using the text I have already entered.
Tut83Rep2
sw328nsta
281staRep3
The 3 passwords above were created from the text in the above paragraph without
entering a single keystroke, and can now be copied and pasted into a password
field in a program without a single keystroke. Once you use a created password,
you need to save it to the password field in your RoboForm passcard via copy and paste, and you will have done the entire procedure without once entering a
keystroke. Once you have completed the whole process, you should delete the
password from your list of created passwords and resave the file without that
password in it. Just remember to backup your RoboForm data so you dont ever lose your entry info. You can change your passwords monthly, if you like, using this method, and you probably will never have this information "hacked" from your PC.
CONCERNING EGOLD'S SRK FEATURE
E-gold has incorporated a security feature called SRK. It in actuallity, is a
virtual keyboard, and is immune from keylogging programs. This is a must when
entering your passphrase, if you dont use RoboForm, and when you enter it in the profile section of E-gold for the first time, you should use the SRK feature there at least. My cut and paste password creation technique will do the same job, but the SRK may be more convenient for some folks.
As an added note I would like to say that it is also good security to make sure
you always stay up-to-date with your browser, IE6, or whatever you use, and also your Windows security updates. Because of the security of using it, I am using Mozilla Firefox as my main browser now. You may download it free from Mozilla.
A brief word about Norton Programs
I am an avid supporter of using Norton SystemWorks and Norton Internet Security.
They cost in the neighborhood of $140.00 for both of them, but they contain
everything you will need, except the mechanical firewall, to maintain
"Top-notch" Internet security. There are some exellent free software programs
out there, but we are talking about protecting your on line account info, and
your online E-currency accounts from a hackers intrusion. It is an investment
worth making. In my own opinion, Norton is the best you can buy. I personally do not like compromising my internet security and I advise you to take on this
attitude also.
USEFUL LINKS THAT YOU NEED
Norton Programs http://www.symantec.com
RoboForm http://www.roboform.com
McAfee Programs http://us.mcafee.com/
AVG Anti-virus http://www.grisoft.com/
Ad Aware http://www.lavasoftusa.com/software/adaware/
SpyBot S&D http://www.safer-networking.org/index.php?page=download
Anti-Keylogger http://www.spydex.com/advanced_anti_keylogger.html
Virtual Keyboard http://www.lakefolks.org/cnt/
Password Auto-generator http://tjc.iwarp.com/password.htm
Zone Alarm Firewall
http://www.zonelabs.com
Zone Labs Security Scanner http://download.zonelabs.com/bin/free/cm/index4.html
Shields Up https://grc.com/x/ne.dll?bh0bkyd2
UPS by Belkin http://www.belkin.com
UPS by APC http://www.apc.com
There are is a multitude of options for internet security on the internet. You
can enter "keywords" into your google or Yahoo searches and come up with a large variety of choices.
Some of these key words are:
anti-virus
virus
spyware
firewall
NAT router
In Summary, I would like to say that I hope this guide can help you avoid a
nightmare on the internet. I welcome any positive comments and replies that will aid those who need information pertaining to this subject. I pray that I save someone from losing money and from having their system invaded. Thank you for your interest
Written by
Wally Dow "
***
All the best,
Tony P
http://myhyipworld.com
http://www.myhyipworld.com/AAI.htm
http://finance.groups.yahoo.com/group/investmentprograms
http://www.easyresponders.com/subscribe.aspx?u=1231/1490
http://finance.groups.yahoo.com/group/AAInvestors
http://finance.groups.yahoo.com/group/HYIPGames
***
- The Dollar Forum Plus Yahoo! Group Create your acc...
- Re: [mediacare] Re: Tanggapan atas Kajian UGM dala...
- File - Status email Anda
- File - Production and Operations Management Newsle...
- File - Six Sigma for Service_American Express.pdf ...
- File - LEAN-SIGMA_GREEN_COMPANY.pdf
- File - BSC_Balanced Score Card.pdf
- File - Are you an Indonesian
- File - Malcolm Baldrige National Quality Award (MB...
- File - Preparing.OSHA.Inspection.pdf
- File - blue_ocean_strategy.new2.pdf
- File - Menjadi Seorang Problem Solver yang Profesi...
- File - Implementasi Lean Six Sigma pada Industri J...
- File - Ingin belajar bahasa Inggris gratis?
- Yahoo! Groups: Welcome to momsview. Visit today!
- File - Membership Bonus - Download Now .txt
- Yahoo! Groups: Welcome to Vyom-Jobs. Visit today! ...
- File - Urgent Freshers Requirements - Apply Now.ht...
- File - _VyomInterviewSuccessKit_FreeCopy.pdf
- File - Download Latest 2007 Placement Papers.htm
- File - [Hot Job] Onsite Opportunity for Freshers. ...
- Yahoo! Groups: Welcome to SixSigmaHR. Visit today!...
- File - mediacare-welcome.txt
- Yahoo! Groups: Welcome to mediacare. Visit today! ...
- Yahoo! Groups: Welcome to globalb2bnews. Visit tod...
- Yahoo! Groups: Welcome to Javedan-Batteries. Visit...
- Yahoo! Groups: Welcome to Vdeha. Visit today!
- File - Free On-Line "WHOLESALE" Webstore Details ...
- Yahoo! Groups: Welcome to lemonaidlady. Visit toda...
- Yahoo! Groups: Welcome to TheDollarForumPlus. Visi...
- File - Take The Internet Back.htm
- Yahoo! Groups: Welcome to writing-tips. Visit toda...
- File - Emails from E-Gold or any OTHER Pay Process...
- File - message settings.txt
- File - Pending membership
- File - Bad IP List
- Yahoo! Groups: Welcome to currency_trading. Visit ...
- Yahoo! Groups: Welcome to Attorney_Humor_Club. Vis...
- Yahoo! Groups: Welcome to MyCrore. Visit today!
- Yahoo! Groups: Welcome to plazapulsa. Visit today!...
- File - Tentang PlazaPulsa dot com on YahooGroups ...
- File - Aturan Main Milinglist PlazaPulsa on YahooG...
- File - Kebijaksanaan Posting Iklan di Milinglist P...
- File - Saya Kira Sudah Terlambat Berbisnis Pulsa
- File - Apapun Bisnis Anda PlazaPulsa.com selalu me...
- File - REQUIRED MEMBERSHIP APP for AARG
- File - BCAMCA Online Community Promotion.pdf
- File - Spammers Policy.txt
- File - $Past BCAMCA-INDIA Online Community Events....
- File - $BCAMCA Online Community Promotion
- Yahoo! Groups: Welcome to bcamca-india. Visit toda...